1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 1.2 +++ b/toolkit/crashreporter/google-breakpad/src/common/linux/safe_readlink_unittest.cc Wed Dec 31 06:09:35 2014 +0100 1.3 @@ -0,0 +1,89 @@ 1.4 +// Copyright (c) 2011, Google Inc. 1.5 +// All rights reserved. 1.6 +// 1.7 +// Redistribution and use in source and binary forms, with or without 1.8 +// modification, are permitted provided that the following conditions are 1.9 +// met: 1.10 +// 1.11 +// * Redistributions of source code must retain the above copyright 1.12 +// notice, this list of conditions and the following disclaimer. 1.13 +// * Redistributions in binary form must reproduce the above 1.14 +// copyright notice, this list of conditions and the following disclaimer 1.15 +// in the documentation and/or other materials provided with the 1.16 +// distribution. 1.17 +// * Neither the name of Google Inc. nor the names of its 1.18 +// contributors may be used to endorse or promote products derived from 1.19 +// this software without specific prior written permission. 1.20 +// 1.21 +// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 1.22 +// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 1.23 +// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 1.24 +// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 1.25 +// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 1.26 +// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 1.27 +// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 1.28 +// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 1.29 +// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 1.30 +// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 1.31 +// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 1.32 + 1.33 +// safe_readlink_unittest.cc: Unit tests for google_breakpad::SafeReadLink. 1.34 + 1.35 +#include "breakpad_googletest_includes.h" 1.36 +#include "common/linux/safe_readlink.h" 1.37 + 1.38 +using google_breakpad::SafeReadLink; 1.39 + 1.40 +TEST(SafeReadLinkTest, ZeroBufferSize) { 1.41 + char buffer[1]; 1.42 + EXPECT_FALSE(SafeReadLink("/proc/self/exe", buffer, 0)); 1.43 +} 1.44 + 1.45 +TEST(SafeReadLinkTest, BufferSizeTooSmall) { 1.46 + char buffer[1]; 1.47 + EXPECT_FALSE(SafeReadLink("/proc/self/exe", buffer, 1)); 1.48 +} 1.49 + 1.50 +TEST(SafeReadLinkTest, BoundaryBufferSize) { 1.51 + char buffer[PATH_MAX]; 1.52 + EXPECT_TRUE(SafeReadLink("/proc/self/exe", buffer, sizeof(buffer))); 1.53 + size_t path_length = strlen(buffer); 1.54 + EXPECT_LT(0U, path_length); 1.55 + EXPECT_GT(sizeof(buffer), path_length); 1.56 + 1.57 + // Buffer size equals to the expected path length plus 1 for the NULL byte. 1.58 + char buffer2[PATH_MAX]; 1.59 + EXPECT_TRUE(SafeReadLink("/proc/self/exe", buffer2, path_length + 1)); 1.60 + EXPECT_EQ(path_length, strlen(buffer2)); 1.61 + EXPECT_EQ(0, strncmp(buffer, buffer2, PATH_MAX)); 1.62 + 1.63 + // Buffer size equals to the expected path length. 1.64 + EXPECT_FALSE(SafeReadLink("/proc/self/exe", buffer, path_length)); 1.65 +} 1.66 + 1.67 +TEST(SafeReadLinkTest, NonexistentPath) { 1.68 + char buffer[PATH_MAX]; 1.69 + EXPECT_FALSE(SafeReadLink("nonexistent_path", buffer, sizeof(buffer))); 1.70 +} 1.71 + 1.72 +TEST(SafeReadLinkTest, NonSymbolicLinkPath) { 1.73 + char actual_path[PATH_MAX]; 1.74 + EXPECT_TRUE(SafeReadLink("/proc/self/exe", actual_path, sizeof(actual_path))); 1.75 + 1.76 + char buffer[PATH_MAX]; 1.77 + EXPECT_FALSE(SafeReadLink(actual_path, buffer, sizeof(buffer))); 1.78 +} 1.79 + 1.80 +TEST(SafeReadLinkTest, DeduceBufferSizeFromCharArray) { 1.81 + char buffer[PATH_MAX]; 1.82 + char* buffer_pointer = buffer; 1.83 + EXPECT_TRUE(SafeReadLink("/proc/self/exe", buffer_pointer, sizeof(buffer))); 1.84 + size_t path_length = strlen(buffer); 1.85 + 1.86 + // Use the template version of SafeReadLink to deduce the buffer size 1.87 + // from the char array. 1.88 + char buffer2[PATH_MAX]; 1.89 + EXPECT_TRUE(SafeReadLink("/proc/self/exe", buffer2)); 1.90 + EXPECT_EQ(path_length, strlen(buffer2)); 1.91 + EXPECT_EQ(0, strncmp(buffer, buffer2, PATH_MAX)); 1.92 +}